Sie sind auf Seite 1von 7

SETIT 2007

4th International Conference: Sciences of Electronic,


Technologies of Information and Telecommunications
March 25-29, 2007 – TUNISIA

Fuzzy approach for 802.11 wireless intrusion detection


H.BELLAAJ*, ***, R.KETATA**, *** A.HSINI
*
Military Academy of Fondouk Jedid Nabeul Tunisia
bellaaj@yahoo.fr
**
National Institute of Applied Science and Technologies of Tunis , Tunisia
raouf.ketata@insat.rnu.tn
***
Research unit on Intelligent Control and Optimization of Complex System (ICOS)
National Engineering School of Sfax, BP.W, 3038, Sfax Tunisia

Abstract: This paper proposes a new fuzzy logic approach to perform analysis and detection intrusion in 802.11
wireless networks. The algorithm consists of five steps: First, construct the networks and generate many cases of daily
traffic and intrusion. In the same time, catch different values of system and network parameters and associate to them a
potential degree of severity alarm. Second, generate fuzzy rules from numerical data using Mendel Wang method.
Third, implement a new rule base on each computer and start system; then adjust it to catch parameters cyclically and
compute severity alarm. If it detects intrusion, then it will send a message to every network node. Fourth, in case of
errors or no system response would start learning mechanism by injection of numerical values and generate fuzzy rules.

Key words: Fuzzy logic, Network security, Wireless intrusion detection.

need of an access point; given that they do not


need access to network resources.
INTRODUCTION – WMANS: Wireless Metropolitan Area Networks
Recently, there has been a growing interest in the (802.16): This technology allows the connection
use of wireless LAN (WLAN) technology. Examples of multiple networks in a metropolitan area such
of applications range from standard Internet services, as different buildings in a city, which can be an
such as Web access, to real-time services with strict alternative or backup to laying copper or fibre
latency/throughput requirements, such as multimedia cabling.
video and voice over IP (VoIP). Future applications – WWANS: Wireless Wide Area Networks (802.20):
will be more demanding and may include high These types of networks can be maintained over
definition television (HDTV) and audiovisual support large areas, such as cities or countries, via
[N.Ramos, & al. 10]. multiple satellite systems or antenna sites looked
after by an ISP. These types of systems are
Different types of wireless networks are now referred to as 2G (2nd Generation) systems.
available:
– WPANS: Wireless Personal Area Networks
(802.15 Bluetooth): The two current technologies With the increased usage of wireless LANs,
for wireless personal area networks are Infra Red network security has become a major issue. Three
(IR) and Bluetooth (IEEE 802.15). These will major methods are available:
allow the connectivity of personal devices within – Service Set Identifier (SSID), logical network
an area of about 30 feet. However, IR requires a names in the wireless LAN
direct line of site and the range is less. – Access Control List (ACL) or Media Access
– WLANS: Wireless Local Area Networks (802.11): Control (MAC) – filtering, this means
allow users in a local area, such as a university identification of the WLAN clients via their MAC
campus or library, to form a network or gain address (worldwide unique identification number
access to the internet. A temporary network can of the network card)
be formed by a small number of users without the – Wired Equivalent Privacy (WEP), encryption
standard in WLANs

-1-
SETIT2007

AP. The client stations are generally equipped with a


As, Wired Equivalent Privacy (WEP) has been wireless network interface card (NIC) that consists of
proved vulnerable to attacks, it is necessary to monitor the radio transceiver and the logic to interact with the
the activities of the wireless LAN. Network probes or client machine and software. An AP comprises
scans attempt to discover vulnerabilities and network essentially a radio transceiver on one side and a bridge
probes are attempting to find open doors for future to the wired backbone on the other. The AP, a
attacks if the network probe returns positive results for stationary device that is part of the wired
the hacker [D. Dasgupta & al. 04]. infrastructure, is analogous to a cell-site (base station)
in cellular communications. All communications
This work is motivated by the fact that most between the client stations and between clients and the
existing intrusion detection systems (IDSs) fail to wired network go through the AP.
detect many cyber attacks because they lack intelligent
techniques to make correct decisions in detecting Although most WLANs operate in the
distributed attacks [D. Dasgupta & al. 04]. Only “infrastructure” mode and architecture described
intrusion in WLANS will be treated. above, another topology is also possible. This second
topology, the ad hoc network, is meant to easily
Our solution consists of fuzzy approaches by interconnect mobile devices that are in the same area
construct network; generate daily traffic and different (e.g., in the same room). In this architecture, client
cases of intrusion. Then, assign to different numerical stations are grouped into a single geographic area and
values a degree of severity alarm. Generate fuzzy rules can be Internet-worked without access to the wired
by Mendel Wang method. Implement rule base on LAN (infrastructure network). The interconnected
each PCs and start system. Its works consist of devices in the ad hoc mode are referred to as an
catching traffic and system parameters. Finally independent basic service set (IBSS).
compute severity alarm. In case of intrusion send a
message for every network nodes. The ad hoc configuration is similar to a peer-
to-peer office network in which no node is required to
The remainder of this paper is organized as function as a server. As an ad hoc WLAN, laptops,
follows: In section II, a brief review of the 802.11 desktops and other 802.11 devices can share files
norm. In section III, security problems are presented. without the use of an AP.
Next discussion of network security attacks and
detection of intrusion tools are presented in section IV
and V. A fuzzy system and Mendel Wang method are
2. Security problems of 802.11 network
presented in section VI. After that, system architecture Matthew Gast explains in [M.Gast 09b] seven
and algorithms is presented in section VII, followed points security problems of 802.11 network wireless:
by possible results discussed in section VIII. Finally, – Problem 1: Easy Access
we present our conclusion. – Problem 2: "Rogue" Access Points
– Problem 3: Unauthorized Use of Service
– Problem 4: Service and Performance Constraints
1. IEEE 802.11 wireless network – Problem 5: MAC Spoofing and Session Hijacking
architecture – Problem 6: Traffic Analysis and Eavesdropping
The IEEE 802.11 standard permits devices to – Problem 7: Higher Level Attacks
establish either peer-to-peer (P2P) networks or
networks based on fixed access points (AP) with 3. Network security attacks
which mobile nodes can communicate. Hence, the
standard defines two basic network topologies: the Network security attacks are typically divided
infrastructure network and the ad hoc network. The into passive and active attacks. These two broad
infrastructure network is meant to extend the range of classes are then subdivided into other types of attacks.
the wired LAN to wireless cells. A laptop or other All are defined below.
mobile devices may move from cell to cell (from AP
to AP) while maintaining access to the resources of the 3.1. Passive attack
LAN. A cell is the area covered by an AP and is called An attack in which an unauthorized party gains access
a “basic service set” (BSS). The collection of all cells to an asset and does not modify its content (i.e.,
of an infrastructure network is called an extended eavesdropping). Passive attacks can be either
service set (ESS). This first topology is useful for eavesdropping or traffic analysis (sometimes called
providing wireless coverage of buildings or campus traffic flow analysis). These two passive attacks are
areas. By deploying multiple APs with overlapping described below.
coverage areas, organizations can achieve broad – Eavesdropping: The attacker monitors
network coverage. WLAN technology can be used to transmissions for message content. An example
replace wired LANs totally and to extend LAN of this attack is a person listening to the
infrastructure. transmissions on a LAN between two
workstations or tuning into transmissions
A WLAN environment has wireless client between a wireless handset and a base station.
stations that use radio modems to communicate to an – Traffic analysis: The attacker, in a more subtle

-2-
SETIT2007

way, gains intelligence by monitoring the management console. Their starter kit provides five
transmissions for patterns of communication. A sensors and can guard up to ten access points (APs).
considerable amount of information is AirDefense detects intruders and attacks and also
contained in the flow of messages between diagnoses potential vulnerabilities in the network like
communicating parties. misconfigurations [Y.X.Lim & al. 12].

Figure 1 provides a general taxonomy of security Another commercial product is AirMagnet


attacks to help organizations and users understand [AirMagnet 02] which runs on laptops or handhelds
some of the attacks against WLANs [T.Karygiannis, & and also includes a Cisco wireless card in the package.
al. 11]. Like AirDefense, it incorporates detection of
vulnerabilities and intrusions. For intrusions,
AirMagnet detects unauthorized APs and clients and
DoS attacks by flooding. A similar product is
Surveyor Wireless [Finisar 05]. These software
products require a technician to move around the
network to detect possible security threats.
Interestingly, this software may also be used by an
intruder, though such use is unlikely because of the
high price [Y.X.Lim & al. 12].
Figure 1 : Taxonomy of Security Attacks
One non-commerical product is Fake AP [Black
Alchemy Enterprises 03]. Fake AP is a simple Linux
3.2. Active attack program that simulates a user-specified list of APs by
An attack where by an unauthorized party makes broadcasting IEEE 802.11b beacon frames. This
modifications to a message, data stream, or file. It is potentially confuses an intruder passively sniffing the
possible to detect this type of attacks but it may not be network. The program is available freely under the
preventable. Active attacks may take the form of one GNU Public License (GPL) [Y.X.Lim & al. 12].
of four types (or combination thereof): masquerading,
replay, message modification, and denial-of-service AirSnare [J. L. DeBoer 07] is a program for Windows
(DoS). These attacks are defined below. that detects DHCP requests or unauthorized MAC
– Masquerading: The attacker impersonates an addresses attempting to connect to an AP. Intrusion
authorized user and thereby gains certain response consists of an alert to the administrator and
unauthorized privileges. optional message is sent to the intruder via Windows
– Replay: The attacker monitors transmissions netmessage. AirSnare has a non-commercial license
(passive attack) and retransmits messages as the [Y.X.Lim & al. 12].
legitimate user.
– Message modification: The attacker alters a
legitimate message by deleting, adding to, 5. Fuzzy logic
changing, or reordering it. Sensed by the philosopher Max Black since
– Denial-of-service: The attacker prevents or 1937, the concept of fuzzy logic is really introduced in
prohibits the normal use or management of 1965 by Lotfi Zadeh. He made a comparison between
communications facilities. the computers of the era and the human reasoning (the
comparisons always valid); If a computer calculates
The risks associated with 802.11 are the result of much more quickly in a rigorous way, its abilities to
one or more of these attacks. The consequences of reflect and learn are limited. Moreover, its rigidity as a
these attacks include, but are not limited to, loss of machine and its binary operation do not let it adapt to
proprietary information, legal and recovery costs, certain tasks, which seem to be simple to human
tarnished image, and loss of network service. beings.

The principle of fuzzy logic is attributed to the fact


4. Detection of intrusion in the wireless that boolean variable which can take only two values
network (True or False) is badly adapted to the human
A recent study in [Y.X.Lim & al. 12] show that there knowledge. Although the traditional logic considers
exist a few products that perform the intrusion that a proposal is either true or false, the fuzzy logic
detection and active response roles for the above distinguishes indefinite values of truth (between 0 and
attacks. However, none provide adequate protection 1). [H.N.V.Havinga & al. 06]
for wireless networks, especially for larger
deployments. Fuzzy logic systems use membership functions and
rules collection. They transform the input variables
AirDefense [Air Defense Inc 01] is a complete into fuzzy terms. The latter are used at the execution
hardware and software system consisting of sensors of rules formulated by linguistic expressions. Often
deployed throughout the network, which are interfaced fuzzy systems transform linguistic conclusions into
to a management appliance, and adminstered by a output variables.

-3-
SETIT2007

controller. The experience of the human controller is


usually expressed as some linguistic “IF-THEN” rules
that state in what situation(s), which action(s) should
be taken. The sampled input-output pairs are some
Figure 2: General architecture of an expert system numerical data that give the specific values of the
inputs and the corresponding successful outputs [L.-
Figure 2 describes different operations for inference X.Wang & al. 08] .
mechanism. We distinguish: fuzzification, inference,
composition and defuzzification. Each of the two kinds of information alone is
usually incomplete. Although the system is
5.1. Fuzzification successfully controlled by a human controller, some
Once the variables, the linguistic sets and the information will be lost when human controllers
connection between them are defined, we present the express their experience by linguistic rules.
input parameters to the membership function which Consequently, linguistic rules alone are usually not
describes one or more linguistic terms. This can be enough for designing a successful control system. On
done by the projection of input value on the curves the other hand, the information from sampled input-
representing membership function or by direct output data pairs is also usually not enough for a
calculation. As a result, we obtain one or many successful design, because the past operations usually
linguistic terms witch are associated with the cannot cover all the situations the control system will
membership degree. face [L.-X.Wang & al. 08] .

5.2. Inference This method developed in [L.-X.Wang & al. 08]


This step consists of generating the fuzzy output by Mendel and Wang consist of generating fuzzy rules
variables by the rules application. Through the from numerical data pairs, collecting these fuzzy rules
calculation of the degree of truth of the premises of and the linguistic fuzzy rules into a common fuzzy
these latter, new membership functions are also rule base and finally designing a control or signal
generated with the indication of the degree of truth of processing system based on the combined fuzzy rule
the obtained variables. This step corresponds in base. A five step procedure for generating fuzzy rule
general to the Min or Product functions. from numerical data pairs was proposed:

5.3. Composition Step 1: divide the input and output spaces of the given
In this step, which is also called aggregation of numerical data into fuzzy regions.
rules, all fuzzy sets assigned to the conclusion part of
the rules after inference, is combined to form only one Step 2: generate fuzzy rules from the given data; first
fuzzy subset. A new membership function is then determine the degrees of given data in different
created. In general we use Sum or Max function. regions. Second assign it to the region with maximum
degree. Finally obtain one rule from one pair of
5.4. Defuzzification desired input / output data.
Sometimes it is possible to examine just fuzzy set
of output variables which are the result of the Step 3: assign a degree of truth to each of the
composition process. Often these fuzzy values need to generated rules for the purpose of resolving conflicts
be converted into a singular number. This is the reason among the generated rules.
of the defuzzification process. Several methods of
defuzzification exist. The center of gravity and the Step 4: create a combined fuzzy rule base based on
Max methods are the two most prevalent techniques. both the generated rules and linguistic rules of human
In the first, output variables are calculated by the experts.
research of gravity center of the membership function
of the fuzzy value. In the second method, one of the Step 5: determine a mapping from input space to
variables in which the fuzzy subset is in its maximum output space based on the combined fuzzy rule base
value of truth, is selected. using a deffuzification procedure.

6. Generating fuzzy rules from numerical 7. Proposed approach


data In this approach, we have been inspired by the
To design a control system, first we need to see work of D. Dasgupta and al. in [D. Dasgupta & al.
what information is available. We assume that there is 04]. It consists of an agent-based approach for
no mathematical model, i.e., we consider a model free monitoring and detecting different kinds of attacks in
design problem. Since there is already a human wireless networks. The long-term goal of this research
controller who is successfully controlling the system, is to develop a self-adaptive system that will perform
two kinds of information are available to us: 1) first real-time, monitoring, analysis, detection, and
the experience of the human controller; seconds generation of appropriate responses to intrusive
sampled input output (state-control) pairs that are activities. Its approach supposes existing of manager
recorded from successful control by the human agent. This can present different defaults like these

-4-
SETIT2007

problems or disconnection of this station. 7.4. Generating fuzzy rules base


We use Mendel Wang method for generating
Our approach consists of implementing same fuzzy rules base from numerical data. Efficiency of
system in each node. We use only one station in rule this algorithm depends on choice of fuzzy membership
base creation. Next we present given systems and function and numerical data extracted. Generating
networks parameters. Fuzzy member ship functions algorithm is implemented in each node, this, for
and traffic generation condition are exposed. Then, we catching maximum data values and tests cases. We
discuss generating rules and implementation process, start with 200 values which generate about 30 rules.
learning algorithm. Finally, we present the architecture
of the system. 7.5. Implementation of rule base and system work
7.1. System and network parameters Basic architecture of the system is given in
figure 4.
To choose fuzzy parameters judiciously, a whole
survey can be done in order to optimize the compute
time. This survey will be the topic of a future work. In
this approach we have made some tests through which
we have selected 6 entry parameters:

- PN : Process number
- OctRecN : Received octet number
- OctSentN : Sent octet number
- PktRecN : Received packet number
- PktSentN : Sent packet number
- BW : Band width

7.2. Membership functions Figure 4: Wireless intrusion detector architecture


Triangular membership functions are chosen.
Limits for each function are adjusted after different Actually system is composed of two principal
tests. Figure 3 presents membership function for components: one for generating fuzzy rules and the
received octet number parameter. other for detection intrusion. These two parts use
SNMP server for detecting parameters values.

7.6. Learning
In the case where the system can’t respond or
gives wrong results, we can take a learning process.
This consists of catching values of each parameter.
Assign to them a severity degree of alarm. Start a
generating fuzzy rules algorithm and implementing
this rule in data base. The result of this operation must
be injected in each wireless intrusion detector.
Figure 3: OctRecN member ship function
8. Application results
7.3. Traffic generation
Twice of the obtained rules from initial
For traffic generation, different cases are retained numerical data are:
considered. Five scenario tests are realized. It consists • if PN is Low and OctRecN is Low and
of different cases of use. Results depend on daily OctSentN is Low and BW is Low and
traffic network and the nature of application. This step PktRecN is Low and PktSentN is Low then
must be treated in each network before starting the SA is Low
system in each node. In our case we consider a
• if PN is Medium high and OctRecN is
network with six nodes. Traffic generation
Medium Low and OctSentN is High and BW
corresponds to research unit flow. One of these
is Medium and PktRecN is Medium and
scenarios consists of:
PktSentN is Medium then SA is High
- starting six PCs in network
Where SA is the severity alarm
- starting many applications (Matlab, oracle,
jbuilder, …) in different nodes
Figure 5 and 6 presents the evolution of parameter
- starting downloads operations
PN and PktSentN. Through it, we can distinguish
- starting active intrusion
different scenarios of network works: low and high
- catching different values and assigning to
traffic.
them a high severity alarm (In this case 5)

-5-
SETIT2007

was explained previously.

9. Conclusion
This work is one of many different first steps for
wireless network intrusion detection.

Our proposition consists, in generation of fuzzy


rules from numerical data. These latter are not
anything other than the translation of the daily traffic
with assignment of alarm degree. Once the rule basis
is generated, it is implemented in each station of the
network. If alarm is detected, a message will be
Figure 5: Evolution of parameter PN transmitted to each node. An approach of training is
foreseen. The solution is currently proposed in ad hoc
mode. It is however expandable.

Some conclusions can be discussed:

- In the inverse of existent methods, the new


technique uses a human logic and can be
performed for a specific use. This means
adjustment and definition of membership
function of each variable specifically for the
average traffic of the network. A high study of
different combination of parameters which can
influence the network can attempt to a best
tools for intrusion detection.
Figure 6: Evolution parameter PktSentN
- Obtained results depend on tests scenarios and
Application results are illustrated in figure 7. One recovered numerical data. In fact, we can speak
notice, that the answer of the system closes enough to about special tool which jugged abnormal
the desired answer. The difference can be explained by traffic compared to the daily
the fact that the generated rules depend strongly on
tests scripts established again. Indeed, one take - Adjustment and gait of fuzzy membership
generation of a daily traffic as a basis which can be function can be a subject of study to optimize a
destabilized by a simple heavy downloading. system response.

Different possibility of improvement of


performance is actually discussed. In fact we can
behave in three different layers:

• Generation of numerical data: we will


examine the possibility of using TSK fuzzy
models. The learning of TSK parameters will
be done with gradient descent method.
• Comparative study between networks
parameters: One approach is to use different
combination of network parameters to find
the best significant variables for each case of
Figure 7: Wireless intrusion detector architecture networks.
• Working on line: this means that the system
We notice in some cases that the elevation of the in arrive of new data pair can be learning by
tests scripts improves considerably the gotten results. generating new rules (Mamdani case) or
It will be the subject of our future work. Now, one can adjusting TSK parameters or adjusting
evaluate the rate of success of this system to 14/20 membership functions.
almost 70%.

Mathematically, in certain case the system cannot REFERENCES


answer. This is mainly when we are considerably out [Air Defense Inc 01] Wireless LAN Security for the
of tests achieved for rules generation. The system is Enterprise Air Defense, [Website], [cited 2003 Jan 30],
then brought to apply the procedure of training that Available HTTP: http://www.airdefense.net/

-6-
SETIT2007

[AirMagnet 02] Air Magnet [Website], [cited 2003


Jan 30], Available HTTP:
http://www.airmagnet.com/
[Black Alchemy Enterprises 03] Black Alchemy
Weapons Lab: Fake AP, Black Alchemy
Enterprises, [Online document], 2002 Oct 12,
[cited 2003 Jan 30], Available HTTP:
http://www.blackalchemy.to/Projects/fakeap/fake-
ap.html
[D. Dasgupta & al. 04] MMDS: Multilevel
Monitoring and Detection - System proceedings of
the 15th Annual Computer Security Incident
Handling Conference (FIRST), Ottawa, Canada
June 22-27, 2003
[Finisar 05] Surveyor Wireless, Finisar, [Website],
[cited 2003 Jan 30], Available HTTP:
http://www.gofinisar.com/index.html
[H.N.V.Havinga & al. 06] Fuzzy Logic - Delft
University Technology of, 1999.
[J. L. DeBoer 07] Digital Matrix – AirSnare Digital
Matrix, [Online document], [cited 2003 Jan 30],
Available HTTP:
http://home.attbi.com/~digitalmatrix/airsnare/
[L.-X.Wang & al. 08] Generating fuzzy rules by
learning from examples IEEE Trans. Syst., Man,
Cybern., vol. 22, pp. 1414–1427, Nov./Dec. 1992.
[M.Gast 09a] 802.11 Wireless Networks: The
Definitive Guide Creating and Administering
Wireless Networks. Oreilly Edition April 2002
[M.Gast 09b] Seven Security Problems of 802.11
Wireless. Oreilly Edition 2002
[N.Ramos, & al. 10] Quality of Service Provisioning
in 802.11e Networks: Challenges, Approaches, and
Future Directions - IEEE Network • July/August
2005 University of California at San Diego
[T.Karygiannis, & al. 11] Wireless Network Security
802.11, Bluetooth and Handheld Devices.
Computer Security Division Information
Technology Laboratory National Institute of
Standards and Technology Gaithersburg, MD
20899-8930 November 2002
[Y.X.Lim & al. 12] Wireless Intrusion Detection and
Response Proceedings of the 2003 IEEE Workshop
on Information Assurance United States Military
Academy, West Point, NY June 2003
[Z.Tabona 13] An Introduction to Wireless
Networking – Windows networking.com May
2005

-7-

Das könnte Ihnen auch gefallen